Search results for Using Steghide to Hide your Data Crypticly

Tutorial quote: By using Steghide, we can embed hidden files inside of other files and the average person will never know. This method also encrypts the hidden data, so a password will be required to extract and view whatever is hidden. The method is referred to as steganography.

Tutorial quote: Ubuntu Tweak is a tool that lets you change hidden Ubuntu settings, for example: hide or change the splash screen, show or hide the Computer, Home, Trash, and Network icons, change Metacity, Nautilus, power management, and security settings, etc. Currently Ubuntu Tweak is available only for the Ubuntu GNOME desktop, i.e., it will not work on Kubuntu or Xubuntu. This short guide shows how to install and use Ubuntu Tweak.

Tutorial quote: this is simple tutorial how to recover you data from a damaged disk.Like dd, dd_rescue does copy data from one file or block device to another.dd_rescue is a tool to help you to save data from crashed partition. It tries to read and if it fails, it will go on with the next sectors where tools like dd will fail. If the copying process is interrupted by the user it is possible to continue at any position later. It can copy backwards.

Tutorial quote: In case you want to delete some confidential data from your computer just to make sure that it is no longer accessible to anyone, then do not delete the file using the regular rm command because there will still remain a chance that someone might use a software to recover your deleted data before the specific storage area is overwritten by new data. The proper way to permanently dispose of such data in Linux is the shred command.

Tutorial quote: This tutorial explains how to install and use luckyBackup on an Ubuntu 9.04 desktop. luckyBackup is an application for data back-up and synchronization powered by the rsync tool. It is simple to use, fast (transfers over only changes made and not all data), safe (keeps your data safe by checking all declared directories before proceeding in any data manipulation ), reliable and fully customizable.

Tutorial quote: Normally, Gimp panels are de-attached from the main window, so you practically have 3 windows. And that can be bad for productivity and usability. But you can change that to auto-hiding dock panels.

Tutorial quote: Ever use MSN instant messenger or Google Talk and feel like you are being watched? Well I have a little secret for you; you are being watched. Not that there is anything to hide, but privacy is always a good thing.
By using netcat we can setup a secure chat server, and it only takes about 5 minutes.

Tutorial quote: ather than having a shallow affair with OpenOffice 2.0, we can use it to get a little more intimate with the data. We can even badger it into forming relations. Why force your database tables into a marriage with OpenOffice? Because, as with human relations, life -- and data -- are pretty meaningless without tight connections.

This tip on creating forms is part of a series I'm writing on OpenOffice.org 2.0 Base. So far, I've discussed making a plain database from scratch, creating tables, entering data using the table editor and a simple form and creating a view of a table or tables.

Let's start off with a description of what table relations are anyway, then discuss how to create a data entry form like this one, which has data from two related tables.

Tutorial quote: Cacti is a complete frontend to RRDTool, it stores all of the necessary information to create graphs and populate them with data in a MySQL database. The frontend is completely PHP driven. Along with being able to maintain Graphs, Data Sources, and Round Robin Archives in a database, cacti handles the data gathering. There is also SNMP support for those used to creating traffic graphs with MRTG.

Tutorial quote: Deleting a file or reformatting a disk does not destroy your sensitive data. The data can easily be undeleted. That’s a good thing if you accidentally throw something away, but what if your trying to destroy financial data, bank account passwords, or classified company information. In this article you will learn number of tools(Shred,Wipe,srm,smem,sfill,sswap,DBAN) to delete files securely in GNU/ Linux